AX320 AXIOM Internet & Cloud Investigations


    If the scheduled dates above don't suit or if there are no available dates currently listed, but you are interested in the class, kindly fill in your details below to be added to our Register of Interest.

     

    A member of our training team will contact you with alternative arrangements.

     

    Description

     

    This course is an intermediate-level four-day training course, designed for participants who are somewhat familiar with the principles of digital forensics and who are seeking to expand their knowledge base into cloud-based and social media forensics including Google, Microsoft, Apple, Facebook, Twitter, Instagram, Dropbox, Box, and generic email services. Students will learn multiple techniques in order to acquire data from these services including self-sign in, download your data, warrant returns, and API extractions with Magnet AXIOM. This course will leverage Magnet AXIOM as well as open-source tools and techniques to improve cloud-based acquisitions and investigations.

     

    What to Expect

     

    Hear directly from Larry McClain, Forensic Trainer at Magnet Forensics, about why you should take our Magnet AXIOM Internet and Cloud Investigations (AX320) course, what you can expect when you take it, and what type of real-life experience he brings to the classroom.

     

    Course Prerequisites

     

    Because AX320 is an intermediate-level course, it is strongly recommended that students first complete Magnet AXIOM Examinations. AX200 will provide a thorough understanding of AXIOM that will help students focus on the cloud aspect of investigations in AX320.

    Course Modules

     

    MODULE 1:CLOUD INVESTIGATIONS

     

    • Most investigations do not start directly in the Cloud but instead with a user’s device. Students will learn how to track investigations points left behind on devices including web history, email, installed applications, and sign-ins.
    • A methodology will be taught for these types of investigations and when they can be appropriately used.

     

    MODULE 2: OSINT INVESTIGATIONS

     

    • Before diving directly into the protected data, users can gain information on what is publicly available for a suspect or target.
    • A workflow of using OSINT or Open-Source Intelligence gathering will be covered as well as proper techniques and popular services to gather this information.

     

    MODULE 3: APPLE

     

    • Apple has cloud-based storage available for multiple pieces of their platform. iCloud Drive and iCloud-stored backups can be a crucial part of an investigation.
    • This module will cover iCloud Drive, iCloud Photos, iCloud Backups, and Apple’s “Download your Data” information.

     

    MODULE 4: GOOGLE

     

    • Google powers more than our favorite search-engine,it also has multiple messaging platforms, cloud storage, enterprise solutions, and mountains of web-based storage including web history and passwords.
    • We will investigate several of the platforms available from this service including Gmail, Google Drive, and popular data return services known as Google Takeout.

     

    MODULE 5: MICROSOFT

     

    • Microsoft has created a cloud platform responsible for syncing information from multiple local services with other devices and with the cloud itself thanks to their OneDrive service.
    • This module will cover how to investigate Microsoft accounts found on PCs and how to take that information to what is available on Microsoft’s own servers.

     

    MODULE 6: TWITTER

     

    • Learn how to collect information from Twitter directly—including IP addresses where users have accessed the platform, publicly available “tweets” and connected individuals, as well as retrieving private messages using Magnet AXIOM Cloud.

     

    MODULE 7: FACEBOOK

     

    • This module will cover ways to find activities of Facebook usage on devices, what information can be gathered from Facebook directly, and what information can be gathered from available web scraping through Magnet AXIOM to download Facebook data—including wall posts, friends, and messages through Facebook Messenger.

     

    MODULE 8: INSTAGRAM

     

    • Instagram has gone beyond simply a picture-hosting service, to becoming a heavily used chat service platform in the form of Direct Messages (otherwise known as DMs.)
    • This module will cover how to collect information that is both public and privately available from this service as well as downloaded photos using both the Magnet AXIOM Cloud APIs and publicly available web scrapers.

     

    MODULE 9: DROPBOX

     

    • The amount of data stored in the Cloud goes well beyond simple social media platforms. One of the long-standing services that still remains incredibly popular is the Dropbox service.
    • This module will discuss what information can be gathered from Dropbox directly, by requesting information from the providers, and what information can be collected by directly downloading it using Magnet AXIOM.

     

    MODULE 10: BOX

     

    • Box, another popular cloud-storage platform, will be investigated. Examiner’s will walk through creating their own cloud accounts for this service, what is available, and how that data can be acquired using tools like Magnet AXIOM.

     

    MODULE 11: EMAIL

     

    • What if the subject or target is running their own email server? Or instead, is using a lesser known service that isn’t covered by the ones mentioned above? In these cases, Magnet AXIOM has the ability to directly acquire data from generic POP3 or SMTP services that will be covered in this module as well as how that information can be used in the furtherance of other investigations.

     

    MODULE 12: CUMULATIVE REVIEW

     

    • Using the techniques and information gathered throughout the week, students will finish the investigation that has been worked throughout each separate module.
    • The final exercise will feature a scenario on how to investigate cloud-based data utilizing only the information collected from the Cloud.